Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 19 Feb 2018 16:08:24 +0100
From: Karol Babioch <kbabioch@...e.de>
To: oss-security@...ts.openwall.com
Subject: Re: LibVNCServer rfbserver.c:
 rfbProcessClientNormalMessage() case rfbClientCutText doesn't sanitize
 msg.cct.length

Hi,

Am 18.02.2018 um 19:09 schrieb Solar Designer:
> In case anyone cares and would have asked, no, I did not request CVE
> ID(s) for this, and I don't intend to do so.

this has been assigned: CVE-2018-7225

Best regards,
Karol Babioch

-- 
OpenPGP: 4687 CA1E A0F7 3B1E BB7D  E179 DF49 418F 6267 267B

SUSE Linux GmbH
GF: Felix Imend├Ârffer, Jane Smithard, Graham Norton
HRB 21284 (AG N├╝rnberg)



Download attachment "signature.asc" of type "application/pgp-signature" (802 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ